City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.42.6.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56079
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;204.42.6.124. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 01:20:13 CST 2025
;; MSG SIZE rcvd: 105
Host 124.6.42.204.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 124.6.42.204.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.158.104.101 | attack | Mar 26 23:37:14 XXX sshd[38933]: Invalid user urn from 51.158.104.101 port 56278 |
2020-03-27 07:44:44 |
| 152.32.187.51 | attackspambots | Mar 27 01:12:13 * sshd[14534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.187.51 Mar 27 01:12:14 * sshd[14534]: Failed password for invalid user cb from 152.32.187.51 port 51650 ssh2 |
2020-03-27 08:21:43 |
| 106.12.145.126 | attackbotsspam | Invalid user qdyh from 106.12.145.126 port 40080 |
2020-03-27 08:21:24 |
| 61.243.39.70 | attackbots | port scan and connect, tcp 1433 (ms-sql-s) |
2020-03-27 07:56:14 |
| 190.147.159.34 | attack | Invalid user ftpuser from 190.147.159.34 port 48213 |
2020-03-27 07:51:04 |
| 107.189.10.42 | attackbots | Mar 27 00:50:54 vpn01 sshd[26039]: Failed password for root from 107.189.10.42 port 34008 ssh2 Mar 27 00:51:08 vpn01 sshd[26039]: error: maximum authentication attempts exceeded for root from 107.189.10.42 port 34008 ssh2 [preauth] ... |
2020-03-27 07:59:08 |
| 198.211.110.116 | attack | Invalid user ra from 198.211.110.116 port 49202 |
2020-03-27 08:07:50 |
| 51.75.66.142 | attack | Mar 27 00:34:01 server sshd[44064]: Failed password for invalid user fpi from 51.75.66.142 port 38306 ssh2 Mar 27 00:38:19 server sshd[45160]: Failed password for invalid user hosts from 51.75.66.142 port 51032 ssh2 Mar 27 00:42:15 server sshd[46232]: Failed password for invalid user kbl from 51.75.66.142 port 35526 ssh2 |
2020-03-27 08:14:46 |
| 138.197.221.114 | attackspambots | SSH Invalid Login |
2020-03-27 08:03:56 |
| 188.213.175.98 | attackspambots | Mar 26 23:59:23 h2646465 sshd[30377]: Invalid user dreama from 188.213.175.98 Mar 26 23:59:23 h2646465 sshd[30377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.175.98 Mar 26 23:59:23 h2646465 sshd[30377]: Invalid user dreama from 188.213.175.98 Mar 26 23:59:26 h2646465 sshd[30377]: Failed password for invalid user dreama from 188.213.175.98 port 58594 ssh2 Mar 27 00:05:25 h2646465 sshd[32276]: Invalid user tvs from 188.213.175.98 Mar 27 00:05:25 h2646465 sshd[32276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.175.98 Mar 27 00:05:25 h2646465 sshd[32276]: Invalid user tvs from 188.213.175.98 Mar 27 00:05:27 h2646465 sshd[32276]: Failed password for invalid user tvs from 188.213.175.98 port 58217 ssh2 Mar 27 00:08:46 h2646465 sshd[32546]: Invalid user xut from 188.213.175.98 ... |
2020-03-27 08:04:33 |
| 222.154.252.143 | attackbots | RDP Bruteforce |
2020-03-27 08:20:14 |
| 201.55.199.143 | attackbotsspam | SSH invalid-user multiple login try |
2020-03-27 08:07:31 |
| 103.129.222.207 | attackspambots | Mar 27 00:48:04 ns3042688 sshd\[9759\]: Invalid user xta from 103.129.222.207 Mar 27 00:48:06 ns3042688 sshd\[9759\]: Failed password for invalid user xta from 103.129.222.207 port 35266 ssh2 Mar 27 00:52:10 ns3042688 sshd\[10162\]: Invalid user caitlyn from 103.129.222.207 Mar 27 00:52:12 ns3042688 sshd\[10162\]: Failed password for invalid user caitlyn from 103.129.222.207 port 48424 ssh2 Mar 27 00:56:12 ns3042688 sshd\[10485\]: Invalid user voa from 103.129.222.207 ... |
2020-03-27 08:09:41 |
| 134.175.130.52 | attackspambots | Invalid user asta from 134.175.130.52 port 54528 |
2020-03-27 07:48:37 |
| 170.130.187.6 | attack | Unauthorized connection attempt detected from IP address 170.130.187.6 to port 2048 |
2020-03-27 07:58:42 |